共 50 条
[31]
The Research of Network Intrusion Detection Based on Danger Theory and Cloud Model
[J].
2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I,
2010,
:475-478
[34]
An immune optimization based real-valued negative selection algorithm
[J].
Applied Intelligence,
2015, 42
:289-302
[35]
Three-level Anomaly Disposal System Model Based on Danger Theory
[J].
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31,
2008,
:12555-12559
[36]
Immune Clustering-Based Recommendation Algorithm
[J].
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012),
2012,
:612-616
[37]
Hybrid Approach of SVM and Feature Selection Based Optimization Algorithm for Big Data Security
[J].
PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY,
2020, 605
:694-706
[38]
Print-Defect Detection Method Based on the Modified Artificial Immune Algorithm
[J].
ADVANCED GRAPHIC COMMUNICATIONS AND MEDIA TECHNOLOGIES,
2017, 417
:813-823
[40]
Improved Genetic Algorithm in Intrusion Detection Model Based on Artificial Immune Theory
[J].
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2,
2009,
:658-661